Whitepaper: Actionable Anomalies – How MixMode AI Makes Your Security Data Smarter

In today’s ever evolving cybersecurity landscape there are major problems facing professionals that continue to worsen. These problems center around a shortage of tools advanced enough to understand the baseline of a network in order to pinpoint … Continue reading Whitepaper: Actionable Anomalies – How MixMode AI Makes Your Security Data Smarter

New Video: Why is network data the best source for actionable data in cybersecurity?

In a recent blog post, our Head of Customer Success, Russell Gray, outlined the reasons why network data is the best source for actionable data in cybersecurity. He covered the limitations of each of the elements of a typical security stack (SIEM, Endp… Continue reading New Video: Why is network data the best source for actionable data in cybersecurity?

Four Keys to Comprehensive Network Protection

According to IDC, worldwide security spending is expected to hit $133.8 billion by 2022, a CAGR of 9.2% over four years. Despite the…
The post Four Keys to Comprehensive Network Protection appeared first on Security Boulevard.
Continue reading Four Keys to Comprehensive Network Protection

How Mature is Your Security Automation? See the Survey Results and How You Compare.

We hear a lot about security orchestration, automation, and response.  It will help us with our security skills gap.  It will improve our operational efficiency, thus reducing mean time to detect and respond to incidents.  It will give us more time for… Continue reading How Mature is Your Security Automation? See the Survey Results and How You Compare.

The Benefits, Characteristics and Components of Flyaway Kits for Incident Response

Several different measures of effectiveness tell us incident response (IR) generally takes too long and costs too much. For example, a global study…
The post The Benefits, Characteristics and Components of Flyaway Kits for Incident Response appeared … Continue reading The Benefits, Characteristics and Components of Flyaway Kits for Incident Response

How to Prepare for Misconfigurations Clouding the Corporate Skies

With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data. Continue reading How to Prepare for Misconfigurations Clouding the Corporate Skies

Thwarting the Insider Threat with Network Traffic Analysis

For decades, anyone analyzing network traffic concentrated on external network traffic, known as north-south traffic, through the perimeter via firewalls.  Although firewalls evolved to better analyze this traffic, two primary trends emerged: 1) c… Continue reading Thwarting the Insider Threat with Network Traffic Analysis

Thwarting the Insider Threat with Network Traffic Analysis

For decades, anyone analyzing network traffic concentrated on external network traffic, known as north-south traffic, through the perimeter via firewalls.  Although firewalls evolved to better analyze this traffic, two primary trends emerged: 1) c… Continue reading Thwarting the Insider Threat with Network Traffic Analysis

Network Security Challenges Create a Commercial Imperative for AI

It won’t come as a surprise when I say that digital security has changed over the past few years. Remember when digital security used to be all about signature-based detection? It doesn’t seem like too long ago when that’s all we need… Continue reading Network Security Challenges Create a Commercial Imperative for AI